What drives SMBs to choose open-source technologies?
Mock Dissertation Chapter Three Methodology
Overview: In week 1, you selected a topic and developed a research question for that topic. Then, you developed a data gathering instrument to measure the question either quantitatively or qualitatively. Now that you have had the opportunity to read how scholarly methodologies are written, you will write a condensed 3-4 page methodology section for your research question using the required headings from the University of the Cumberlands Doctoral Research Handbook. Like we discuss in class, each university has unique parameters for what they expect in chapter 3, so you may see papers from other universities that look slightly different. The importance here is to focus on the content, not necessarily the organization. This assignment will help determine your readiness to write a full-length chapter three.
Directions:
1. Review your notes from class on the different methodologies and instruments used to measure. Also, review the rubric:
1.a. DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx
2. Using the appropriate dissertation template, develop a 3-4 page (more is fine) methodology section (mock chapter three) that includes all sections of the respective methodology selected.
Refer to the Attached the dissertation templates
Week1 Research Question:
Using Data Science Techniques To Enhance Data Security in SMBs
Data science is being embedded into cyber security and data security. It is being used to identify the patterns of past attacks and predict the potential risks within the framework of the system. Machine learning is highly used in analyzing large data sets to find the patterns that spot an attack.
Due to the high licensing cost and contracts, many small and medium-scale businesses use open-source tools and applications. This tends to put these organizations in harm’s way. Due to the low volume of data or fewer users in the organization, the management will choose open-source software tools, which sometimes have fewer security protocols and high exposure to data breaches and security threats.
Research Questions:
· What drives SMBs to choose open-source technologies?
· How safe are these open-source data science technologies?
· What measures can be taken to aid SMBs in using open-source data science tools to protect their data better?
I work with a small insurance firm where various open-source applications are used daily. I want to leverage my experience and access to this situation and try finding answers to the above along with my research. I plan to find the reasons behind the management’s decisions and what factors drive technical teams to choose particular open-source technologies. I will research more on their pitfalls and successful implementations.
DSRT 837 Rubric (Adapted from Doctoral Research Handbook)
Criterion
4 (Expert)
3 (Proficient)
2 (Fair)
1 (Poor)
I. Critical and reflective thinking capable of facilitating institutional, informational technology, or business related problem-solving or school/ college improvement
Critically analyzed the topic. Discussion of the topic was extensive and anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Meaning of the analysis was summarized.
Critically analyzed the topic. Discussion of the topic was anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Either the analysis or summary lacked some level of detail.
Somewhat critically analyzed the topic. Discussion of the topic was minimally anchored in fact and reason. Information about significant aspects of the topic were somewhat analyzed from the perspective of key related concepts. Analysis and summary included but lacks a significant level of analysis and discussion.
Minimally discussed the topic without supporting facts and reasons. Poor organization of the information and limited level of detail.
II. Consideration for the impact of leadership, information technology, or business on institutional constituents.
Demonstrates an extensive understanding of the topic’s relationship to leadership, information technology, or business.
Demonstrates a good understanding of the topic’s relationship to leadership, information technology, or business.
Demonstrates a fair understanding of the topic’s relationship to leadership, information technology, or business.
Demonstrates a minimal understanding of the topic’s relationship to leadership, information technology, or business.
III. Effective analytical and communication skills
Demonstrates a professional level of skills associated with formatting, grammar, spelling, syntax, and use of numbers.
Demonstrates acceptable skills associated with formatting, grammar, spelling, syntax, and use of numbers.
Needs minor improvement in skills associated with formatting, grammar, spelling, syntax, and use of numbers.
Needs significant improvement in skills associated formatting, grammar, spelling, syntax, and use of numbers.
IV. Knowledge of genres, paradigms, theories, literature or trends in business, criminal justice, education, English, health sciences, history, information technology, math, nursing, psychology, religion, or student personnel services.
Subject is identified, realistic, and grounded in a recognized genre, paradigm, theory, literature, or trend.
Subject is identified and is realistic, but it lacks grounding in a recognized genre, paradigm, theory, literature, or trend.
Subject is identified but is not realistic or grounded in a recognized genre, paradigm, theory, literature, or trend.
Subject area is not established.
V. Required Components of the assignment as listed in the assignment directions.
All required parts of the assignment as listed in the assignment directions are included.
Minor information is missing from the required components of the assignment as listed in the assignment directions.
Significant information is missing from the required components of the assignment as listed in the assignment directions.
The assignment lacks the detail needed to meet the requirements for the components of the assignment as listed in the assignment directions.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
